Discover Security Events in Network Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
3 days from now
Cloud WAF Roadmap 2026 takes a forward looking view of how web application firewall technology is evolving to address increasingly complex cloud environments and faster, more automated threats. The session examines emerging attack patterns expected to shape 2026 and outlines how Cloud WAF solutions are adapting through improved intelligence, automation and adaptive protection. It also looks at the architectural changes influencing application security in modern cloud native environments.
The discussion covers protection strategies for APIs, microservices and distributed applications, along with how Cloud WAF integrates into a broader security ecosystem for stronger visibility and control. Attendees will gain insight into aligning security investments with business priorities while maintaining performance and user experience. The webinar provides practical guidance for organizations preparing their cloud application defenses for the next generation of threats.
3 days from now
Rapid growth can create unexpected complexity for digital native businesses. This webinar explores how companies built on cloud technologies can overcome scaling challenges while maintaining speed and resilience. The session explains how fragmented applications, technical debt, and a growing attack surface can slow innovation and increase operational costs as organizations expand.
Attendees will examine architectural approaches that help simplify operations while strengthening security through a Zero Trust model. The discussion also covers the maturity journey of digital native businesses, from foundational web security to protecting intellectual property in the age of AI. The session highlights strategies to build a more resilient and scalable digital environment.
3 days from now
Security transformations often introduce challenges that do not align neatly with standard vendor solutions, particularly when organizations must address regulatory requirements, emerging technologies, and evolving infrastructure. This webinar features insights from Indeed as it navigates these challenges while advancing its security strategy. The session explores how the organization approached Secure Access Service Edge (SASE) adoption and experimented with AI to support evolving security needs.
Harshad Kadam, Senior Infrastructure Security Engineer at Indeed, shares practical experiences from implementing customized security solutions and adapting existing platforms to support new requirements. The discussion highlights lessons learned from MCP server security and configuration management, as well as approaches used to build tailored capabilities using Cloudflare’s developer platform. Attendees will gain practical perspectives on fostering innovation within security programs while addressing complex operational and technical challenges.
4 days from now
Financial institutions are entering 2026 with a resilience mandate shaped by evolving cyber threats and rapid AI adoption. This webinar examines how adversaries are shifting from breaching defenses to exploiting stolen identities, while AI introduces new shadow supply chain risks. Designed for CIOs, CISOs, and CTOs, the session brings together global threat intelligence and strategic insights to help leaders prepare for the changing landscape.
Speakers discuss identity focused defense beyond MFA, AI governance as a board level risk issue, and policy based trust for machine to machine interactions. The conversation also addresses hidden risks in over privileged SaaS and AI integrations, along with the need to modernize legacy technology stacks.
4 days from now
The integration of large language models into modern applications introduces new security risks that traditional defenses are not designed to address. This interactive session explores how AI driven systems can be exploited through techniques such as prompt injection, data extraction, and model abuse. Participants will gain hands on experience in a controlled lab environment, simulating real world attacks against AI applications.
During the live lab, attendees will test and defend against common AI threats while observing how advanced security controls detect and mitigate malicious inputs in real time. The session demonstrates how vulnerabilities can be exploited and how modern application security approaches can protect AI systems without disrupting user experience. This event is designed for security engineers, developers, and DevOps practitioners seeking practical exposure to AI security challenges.
4 days from now
Online child safety is becoming a critical issue for telecom providers as families expect stronger protection built directly into their connectivity services. This webinar explores how network based protection can safeguard children’s digital experiences while helping Telcos strengthen differentiation and customer trust. Insights are drawn from Allot’s 2026 Cyber Protection Report, highlighting why safe connectivity is increasingly viewed as essential rather than optional.
The session explains how children’s tap first behavior changes risk exposure and why protection must operate in real time without requiring changes to apps or devices. It also examines how packaging kid safe connectivity can support long term loyalty, trust, and revenue growth for service providers.
4 days from now
Protect your website against the most critical web application threats by understanding the OWASP Top 10 attack vectors and the controls designed to stop them. This session breaks down common exploitation techniques, explains the security rules that mitigate them and outlines practical testing methods to identify and address vulnerabilities before they are abused.
The discussion also covers secure website onboarding, proper ACL configuration and effective security rule management. A live demonstration will show how these protections function in real time, giving attendees clear guidance on strengthening web defenses and improving overall security posture.
5 days from now
Cyber threats across the Asia Pacific region are evolving rapidly, with attackers increasingly relying on identity abuse, social engineering, and data extortion rather than traditional vulnerability exploitation. This webinar examines key trends shaping the 2026 cyber threat landscape and the risks CISOs must prepare for as organizations adapt to new attacker strategies.
The session explores how social engineering is expanding beyond email into voice, chat, and collaboration platforms, and how identity based attacks are bypassing controls such as multi factor authentication and helpdesk verification. Speakers will also discuss the role of unmanaged devices in ransomware incidents and the shift toward data extortion focused attacks. Attendees will gain practical priorities to help security leaders detect threats earlier and reduce business impact.
1 week from now
Security teams rely on visibility that turns raw data into clear, actionable insight, and this webinar focuses on how modern firewall management supports a secure by design approach. The session looks at how correlated analytics and reporting help teams understand security posture, identify weaknesses early, and prevent misconfigurations from becoming attack paths.
The discussion highlights a built in Security Assessment Report that evaluates configuration hygiene and surfaces gaps before they are exploited. Attendees will also see how advanced search across analytics logs, system events, and detailed reports speeds investigations and improves anomaly detection. The webinar is designed for security and network administrators who want stronger operational assurance, continuous validation, and greater confidence in day to day security operations.
1 day ago
Active Directory remains central to enterprise identity, yet legacy protocols and limited modern security controls continue to expose it to risk. This webinar examines why AD is a frequent target in identity based attacks and how evolving audit and insurance expectations are increasing pressure around MFA coverage and reporting. Organizations that rely on AD need stronger protection without rebuilding their infrastructure.
The session outlines practical steps to extend MFA to critical workflows and improve visibility into privileged users and nonhuman identities. It also covers approaches for closing hybrid identity gaps, strengthening compliance, and reducing risk using capabilities designed to simplify implementation and limit disruption.
1 day ago
AI threats are evolving faster than many organizations can adapt their defenses. This webinar examines findings from F5’s practitioner sentiment research, highlighting a shift in concern from what AI systems say to what they do. As enterprises move toward managed deployments, increased autonomy, tool use, and broad data access introduce new risks, including misuse, unintended actions, and faster attacker success.
The session reviews changes over the past year using F5’s AI sentiment data and CASI leaderboard AI threat research. It addresses rising risks such as excessive agency and non human identity, identifies concerns that are declining as AI maturity grows, and explains how F5 AI security solutions respond to emerging threats.
2 days ago
Unapproved use of AI tools is creating hidden security gaps as employees store data, automate tasks, and generate content outside approved systems. This webinar focuses on how shadow AI introduces new risks, why these activities are difficult to detect, and how they expand the attack surface across modern enterprise environments.
The session explains why traditional security controls struggle to keep up with AI driven user behavior and outlines practical ways to restore visibility without adding operational complexity. Attendees will hear strategies for enforcing policy consistently, simplifying security management, and preparing for the next wave of AI related threats while maintaining productivity across distributed teams.